Movatterモバイル変換


[0]ホーム

URL:


US20050132204A1 - Trusted system for file distribution - Google Patents

Trusted system for file distribution
Download PDF

Info

Publication number
US20050132204A1
US20050132204A1US10/733,434US73343403AUS2005132204A1US 20050132204 A1US20050132204 A1US 20050132204A1US 73343403 AUS73343403 AUS 73343403AUS 2005132204 A1US2005132204 A1US 2005132204A1
Authority
US
United States
Prior art keywords
key
secure
insecure
peer
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/733,434
Other versions
US7802109B2 (en
Inventor
Christoph Gouguenheim
Kan Zhang
Salil Pradhan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/733,434priorityCriticalpatent/US7802109B2/en
Assigned to HEWLETT-PACKARD DEVELOPMENT DEVELOPMENT COMPANY, L.P.reassignmentHEWLETT-PACKARD DEVELOPMENT DEVELOPMENT COMPANY, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GOUGUENHEIM, CHRISTOPHE, PRADHAN, SALIL, ZHANG, KAN
Publication of US20050132204A1publicationCriticalpatent/US20050132204A1/en
Application grantedgrantedCritical
Publication of US7802109B2publicationCriticalpatent/US7802109B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A secure token includes a processor for protecting a first cryptographic key against unauthorized access, and creating a second cryptographic key from the first key and a message unique to an insecure device. The second key is usable for file decryption by the insecure device.

Description

Claims (36)

US10/733,4342003-12-102003-12-10Trusted system for file distributionExpired - Fee RelatedUS7802109B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/733,434US7802109B2 (en)2003-12-102003-12-10Trusted system for file distribution

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US10/733,434US7802109B2 (en)2003-12-102003-12-10Trusted system for file distribution

Publications (2)

Publication NumberPublication Date
US20050132204A1true US20050132204A1 (en)2005-06-16
US7802109B2 US7802109B2 (en)2010-09-21

Family

ID=34653086

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US10/733,434Expired - Fee RelatedUS7802109B2 (en)2003-12-102003-12-10Trusted system for file distribution

Country Status (1)

CountryLink
US (1)US7802109B2 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090202081A1 (en)*2008-02-082009-08-13Ayman HammadKey delivery system and method
US20110289326A1 (en)*2008-12-232011-11-24Nbc Universal, Inc.Electronic file access control system and method
US8371855B1 (en)*2008-09-302013-02-12Amazon Technologies, Inc.Sharing electronic books
FR3018371A1 (en)*2014-03-102015-09-11Commissariat Energie Atomique REMOTE KEY DATA ENCRYPTION / ENCRYPTION METHOD AND SYSTEM AND PRIOR CHECK CHECK
US9201713B1 (en)*2013-07-022015-12-01Amazon Technologies, Inc.Registering and controlling policies of applications
US9270447B2 (en)2011-11-032016-02-23Arvind GidwaniDemand based encryption and key generation and distribution systems and methods
US20170220917A1 (en)*2015-03-032017-08-03WonderHealth, LLCAccess Control for Encrypted Data in Machine-Readable Identifiers
US20170264593A1 (en)*2016-03-142017-09-14Airwatch LlcSystem and method to secure the streaming of media to a valid client
US20170286709A1 (en)*2016-03-312017-10-05International Business Machines CorporationEncryption key management for file system
US10263966B2 (en)2016-04-142019-04-16Sophos LimitedPerimeter enforcement of encryption rules
US10454903B2 (en)2016-06-302019-10-22Sophos LimitedPerimeter encryption
US10628597B2 (en)2016-04-142020-04-21Sophos LimitedJust-in-time encryption
US10681078B2 (en)2016-06-102020-06-09Sophos LimitedKey throttling to mitigate unauthorized file access
US10686827B2 (en)2016-04-142020-06-16Sophos LimitedIntermediate encryption for exposed content
US10691824B2 (en)2016-02-122020-06-23Sophos LimitedBehavioral-based control of access to encrypted content by a process
US10791097B2 (en)*2016-04-142020-09-29Sophos LimitedPortable encryption format
US20210203647A1 (en)*2012-03-302021-07-01Nec CorporationCore network, user equipment, and communication control method for device to device communication
US11075820B2 (en)*2017-12-202021-07-27Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US20220060450A1 (en)*2020-08-182022-02-24T-Mobile Usa, Inc.Secure transport session resumption for constrained devices
US20220083676A1 (en)*2020-09-112022-03-17IDEMIA National Security Solutions LLCLimiting video surveillance collection to authorized uses
US11586753B2 (en)*2016-10-252023-02-21Beatport, LLCSecure content access system
US20240106643A1 (en)*2021-06-092024-03-28Vivo Mobile Communication Co., Ltd.Processing method and obtaining method for key material, information transmission method, and device
US20240372700A1 (en)*2018-02-212024-11-07Comcast Cable Communications, LlcSystems and methods for content security
US20250112958A1 (en)*2023-09-282025-04-03Roman GlistvainTransport layer security stack for resource constrained devices

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060272031A1 (en)*2005-05-242006-11-30Napster LlcSystem and method for unlimited licensing to a fixed number of devices
US8515996B2 (en)*2008-05-192013-08-20Emulex Design & Manufacturing CorporationSecure configuration of authentication servers
WO2010011215A1 (en)*2008-07-212010-01-28Hewlett-Packard Development Company, L.P.Media content transfer and remote license acquisition

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US20030005333A1 (en)*2001-06-262003-01-02Tetsuya NoguchiSystem and method for access control
US20030046568A1 (en)*2001-09-062003-03-06Riddick Christopher J.Media protection system and method and hardware decryption module used therein
US6560651B2 (en)*1996-09-122003-05-06Audible, Inc.Digital information library and delivery system with logic for generating files targeting a playback device
US6868403B1 (en)*1998-02-062005-03-15Microsoft CorporationSecure online music distribution system
US7178025B2 (en)*1998-02-132007-02-13Tec Sec, Inc.Access system utilizing multiple factor identification and authentication
US7194092B1 (en)*1998-10-262007-03-20Microsoft CorporationKey-based secure storage
US7337332B2 (en)*2000-10-242008-02-26Nds Ltd.Transferring electronic content

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6560651B2 (en)*1996-09-122003-05-06Audible, Inc.Digital information library and delivery system with logic for generating files targeting a playback device
US6868403B1 (en)*1998-02-062005-03-15Microsoft CorporationSecure online music distribution system
US7178025B2 (en)*1998-02-132007-02-13Tec Sec, Inc.Access system utilizing multiple factor identification and authentication
US7194092B1 (en)*1998-10-262007-03-20Microsoft CorporationKey-based secure storage
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US7337332B2 (en)*2000-10-242008-02-26Nds Ltd.Transferring electronic content
US20030005333A1 (en)*2001-06-262003-01-02Tetsuya NoguchiSystem and method for access control
US20030046568A1 (en)*2001-09-062003-03-06Riddick Christopher J.Media protection system and method and hardware decryption module used therein

Cited By (44)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090202081A1 (en)*2008-02-082009-08-13Ayman HammadKey delivery system and method
US8371855B1 (en)*2008-09-302013-02-12Amazon Technologies, Inc.Sharing electronic books
US20110289326A1 (en)*2008-12-232011-11-24Nbc Universal, Inc.Electronic file access control system and method
US8645687B2 (en)*2008-12-232014-02-04Nbcuniversal Media, LlcElectronic file access control system and method
US9270447B2 (en)2011-11-032016-02-23Arvind GidwaniDemand based encryption and key generation and distribution systems and methods
US12212548B2 (en)*2012-03-302025-01-28Nec CorporationCore network, user equipment, and communication control method for device to device communication
US20210203647A1 (en)*2012-03-302021-07-01Nec CorporationCore network, user equipment, and communication control method for device to device communication
US9201713B1 (en)*2013-07-022015-12-01Amazon Technologies, Inc.Registering and controlling policies of applications
EP2919412A1 (en)*2014-03-102015-09-16Commissariat à l'Énergie Atomique et aux Énergies AlternativesMethod and system for encrypting/decrypting data with a remote key and prior token verification
US10057054B2 (en)2014-03-102018-08-21Commissariat à l'énergie atomique et aux énergies alternativesMethod and system for remotely keyed encrypting/decrypting data with prior checking a token
FR3018371A1 (en)*2014-03-102015-09-11Commissariat Energie Atomique REMOTE KEY DATA ENCRYPTION / ENCRYPTION METHOD AND SYSTEM AND PRIOR CHECK CHECK
US20170220917A1 (en)*2015-03-032017-08-03WonderHealth, LLCAccess Control for Encrypted Data in Machine-Readable Identifiers
US10977532B2 (en)*2015-03-032021-04-13WonderHealth, LLCAccess control for encrypted data in machine-readable identifiers
US10691824B2 (en)2016-02-122020-06-23Sophos LimitedBehavioral-based control of access to encrypted content by a process
US10944727B2 (en)*2016-03-142021-03-09Airwatch LlcSystem and method to secure the streaming of media to a valid client
US20170264593A1 (en)*2016-03-142017-09-14Airwatch LlcSystem and method to secure the streaming of media to a valid client
US11595363B2 (en)*2016-03-142023-02-28Airwatch LlcSystem and method to secure the transmission of files to a valid client
US20210176220A1 (en)*2016-03-142021-06-10Airwatch LlcSystem and method to secure the transmission of files to a valid client
US10452858B2 (en)*2016-03-312019-10-22International Business Machines CorporationEncryption key management for file system
US20170286709A1 (en)*2016-03-312017-10-05International Business Machines CorporationEncryption key management for file system
US10686827B2 (en)2016-04-142020-06-16Sophos LimitedIntermediate encryption for exposed content
US10791097B2 (en)*2016-04-142020-09-29Sophos LimitedPortable encryption format
US10834061B2 (en)2016-04-142020-11-10Sophos LimitedPerimeter enforcement of encryption rules
US10628597B2 (en)2016-04-142020-04-21Sophos LimitedJust-in-time encryption
US10263966B2 (en)2016-04-142019-04-16Sophos LimitedPerimeter enforcement of encryption rules
US10681078B2 (en)2016-06-102020-06-09Sophos LimitedKey throttling to mitigate unauthorized file access
US10979449B2 (en)2016-06-102021-04-13Sophos LimitedKey throttling to mitigate unauthorized file access
US10454903B2 (en)2016-06-302019-10-22Sophos LimitedPerimeter encryption
US10931648B2 (en)2016-06-302021-02-23Sophos LimitedPerimeter encryption
US11586753B2 (en)*2016-10-252023-02-21Beatport, LLCSecure content access system
US11936533B2 (en)*2017-12-202024-03-19Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US20240195705A1 (en)*2017-12-202024-06-13Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US12348386B2 (en)*2017-12-202025-07-01Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US11632309B2 (en)*2017-12-202023-04-18Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US11075820B2 (en)*2017-12-202021-07-27Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US20210344573A1 (en)*2017-12-202021-11-04Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US20240305539A1 (en)*2017-12-202024-09-12Cisco Technology, Inc.Automatically detecting authorized remote administration sessions in a network monitoring system
US20240372700A1 (en)*2018-02-212024-11-07Comcast Cable Communications, LlcSystems and methods for content security
US11824841B2 (en)*2020-08-182023-11-21T-Mobile Usa, Inc.Secure transport session resumption for constrained devices
US20220060450A1 (en)*2020-08-182022-02-24T-Mobile Usa, Inc.Secure transport session resumption for constrained devices
US11899805B2 (en)*2020-09-112024-02-13IDEMIA National Security Solutions LLCLimiting video surveillance collection to authorized uses
US20220083676A1 (en)*2020-09-112022-03-17IDEMIA National Security Solutions LLCLimiting video surveillance collection to authorized uses
US20240106643A1 (en)*2021-06-092024-03-28Vivo Mobile Communication Co., Ltd.Processing method and obtaining method for key material, information transmission method, and device
US20250112958A1 (en)*2023-09-282025-04-03Roman GlistvainTransport layer security stack for resource constrained devices

Also Published As

Publication numberPublication date
US7802109B2 (en)2010-09-21

Similar Documents

PublicationPublication DateTitle
US7802109B2 (en)Trusted system for file distribution
KR101315076B1 (en)Method for redistributing dram protected content
EP1942430B1 (en)Token Passing Technique for Media Playback Devices
US8091137B2 (en)Transferring a data object between devices
US7270193B2 (en)Method and system for distributing programs using tamper resistant processor
US9075957B2 (en)Backing up digital content that is stored in a secured storage device
US7979697B2 (en)Securing digital content system and method
US20040088541A1 (en)Digital-rights management system
US20090276829A1 (en)System for copying protected data from one secured storage device to another via a third party
US20030005246A1 (en)Protection of content stored on portable memory from unauthorized usage
US20110126023A1 (en)Systems And Methods For Data Security
US20090276474A1 (en)Method for copying protected data from one secured storage device to another via a third party
KR20070104628A (en) Share controlled ownership of an individual
WO2002056528A2 (en)Secure extensible computing environment
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
KR100332690B1 (en)Secret key security device with USB port
CN101341490B (en)Method for control access of file system, related system, SIM card and computer program product used therein
CN110740036A (en)Anti-attack data confidentiality method based on cloud computing
CN116488855B (en) Lightweight property rights confirmation system and method based on chain storage structure encryption technology
Lee et al.A portable DRM scheme using smart cards
KR100831726B1 (en) Security method and system in the DRM system
KR100811050B1 (en) Effective Key Distribution Method for Digital Content Distribution
KR20240073387A (en)Did-based verification system for strengthening sovereignty of copyright holders and method for the same
TWI465957B (en)Terminal device execution digital rights management off-line licensing method and terminal device thereof
KR20120126745A (en)Drm system of token-based and contents play method using drm system of token-based

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:HEWLETT-PACKARD DEVELOPMENT DEVELOPMENT COMPANY, L

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GOUGUENHEIM, CHRISTOPHE;ZHANG, KAN;PRADHAN, SALIL;REEL/FRAME:014806/0639

Effective date:20031210

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment:8

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20220921


[8]ページ先頭

©2009-2025 Movatter.jp